Avatar
Komi_Hartman
81d38469313088cce52b8a860711c21e7408860286bb3834a4d74fab717cde2e
“A specter is haunting the modern world, the specter of crypto anarchy.”

"reply in json format ONLY"…

Don’t panic…📊📈

If you want that BIP, go for this notion.. Can be build on Nostr & can be use as a 'patch' to operate on Bitcoin protocol…

https://arxiv.org/pdf/2104.05185.pdf nostr:note172lqze27kglf7yt6nv99k5vupzpdsk049jp8n82zjy8psqwfr3hqw75zz7

What’s going on?? Big tech & the online child sexual exploitation crisis !

Push to trough! The end is near!

https://www.youtube.com/live/eMNY3zI-TPM?si=mJ4ZOlo2HjEdoORd

'Cipher & Hash Function Design Strategies based on linear and differential cryptanalysis' by Joan Daemen

https://cs.ru.nl/~joan/papers/JDA_Thesis_1995.pdf

'Proof-of-randomness protocol for blockchain consensus: a case of Macau algorithms' by Wen-Zhuo Zhang & Vic Kai.

Quantum random number generator (QRNG) chips integration into hardware wallets & systemic use of quantum key distribution (QKD) technology… (bitcoin involved)

https://arxiv.org/pdf/2211.15417.pdf

Security mechanism, block inclusion, all relie on the probabilistic nature of transaction propagation in the decentralized network…

According to Satoshi in the case of 'fast transactions problem', if legitimate transaction reaches 80% of nodes & double-spend attempting to catch up reaches only 20% of nodes, let’s outcome that legitimate transaction has a significantly higher probability of being included in the next block due to its faster & wider propagation…

Explore the full RBF & avoid 0-conf!

https://bitcointalk.org/index.php?topic=423.20 nostr:note1usr99wxxmmp6nw74ghhlvr305csd5d4dfx93qca5tjfswjlprx0qrl5qk7

Reduce memory!

https://github.com/petertodd/bitcoin/blob/full-rbf-v26.0/doc/reduce-memory.md nostr:note1usr99wxxmmp6nw74ghhlvr305csd5d4dfx93qca5tjfswjlprx0qrl5qk7

Reduce traffic!

https://github.com/petertodd/bitcoin/blob/full-rbf-v26.0/doc/reduce-traffic.md nostr:note1vqfhxkhhgmqgj58la6j86tt5702rw44nxjsfgvslz20v33u9nj5q9n3f82

Hash function vulnerability! So, security of hash functions used in blockchain tech can be compromised by QC… fact!

Anyway, Grover's algorithm could be employed to perform a 'brute-force search' on hash functions with 'quadratic speedup', potentially reducing the time required to find a 'collision' while Schor’s algo go for large numbers factorization & effectively could break Cryptographic primitives…

https://www.sec.gov/Archives/edgar/data/1869699/000119312521201955/d165184ds1.htm

Yes, we want Nostr mail! Reused NIP-05 option! nostr:note1hk5xl5en43a2cn3pr5ez0z7acwk34sy66u3z9p4mdsfzwvuzswfs9fkl7f